On 5/29/07, Robert Turner <Rturner (at) hollandhospital (dot) org [email concealed]> wrote:
>
> It seems as all the evidence found could have been spoofed or faked. Email
> addresses and IPs and time stamps on files can be changed to both hide the
> original sender as well as implicate a th

OK Anna, thank you for your answer.I suggested to the defence
counselor to call the ISP administrator, and the administrators of
both servers. I don't know if she will do it, or if it is possible in
this case.

On 5/29/07, Gleyson Melo <gleysonmelo (at) gmail (dot) com [email concealed]> wrote:
> Hi Flavio,
>
> I'm not really an expert, but I tought some things about the case.
>
> 1) I guess you tought in this but.. You may see with defense layer if
> S is really innocent. Otherwise, I don't guess

It should be possible to analyse the torrent seed or the tracker logs if you can get access to those. I briefly looked up the specs of torrent files and there could be some information in there. Have a look at the below link, grab the torrent file (before it gets out of hand and several peo

Someone sent an anonimous email to a lot of destinations. The message
(M) is offensive to a company (C) president (P). After 3 months, a
lawier company (L) specialized in Internet cases made C: 1st. to
request an analysis from a speci

hi Everyone, I was wondering if it's possible to find out where an
upload originated from. Example, My employer's courseware was pirated
on Bit Torrent and I'd like to know who uploaded it or at least knoq what
area it came from.

As some of you already know, I have developed a new training program
for digital forensic examiners and computer security professionals.
This unique series of workshops emphasizes the role of digital
forensics in an organization's information assurance efforts, teaching
practitioners the sk